Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Fuzzy Model for Intrusion Detection using Trust System based Bias Minimization & Application Performance Maximization in MANET

Print
PDF
IJCA Proceedings on International Conference on Internet of Things, Next Generation Networks and Cloud Computing
© 2016 by IJCA Journal
ICINC 2016 - Number 3
Year of Publication: 2016
Authors:
Pradnya M. Nanaware
Sachin D. Babar

Pradnya M Nanaware and Sachin D Babar. Article: Fuzzy Model for Intrusion Detection using Trust System based Bias Minimization & Application Performance Maximization in MANET. IJCA Proceedings on International Conference on Internet of Things, Next Generation Networks and Cloud Computing ICINC 2016(3):6-8, July 2016. Full text available. BibTeX

@article{key:article,
	author = {Pradnya M. Nanaware and Sachin D. Babar},
	title = {Article: Fuzzy Model for Intrusion Detection using Trust System based Bias Minimization & Application Performance Maximization in MANET},
	journal = {IJCA Proceedings on International Conference on Internet of Things, Next Generation Networks and Cloud Computing},
	year = {2016},
	volume = {ICINC 2016},
	number = {3},
	pages = {6-8},
	month = {July},
	note = {Full text available}
}

Abstract

The mobile ad-hoc network (MANET) contains various types of mobile nodes. The Trust of the node is an important issue for deciding the behavior of the node. The behavior of the node is in terms of maliciousness of the node. Trust management for MANETs is an active research area. MANET is a collection of nodes that are self-configuring. There is the absence of any centralized control. In MANET, any node can enter and exit from the communication. This paper addresses the performance issue of trust management. Trust management deals in two important areas :trust bias minimization and application performance maximization The paper helps to implement the best trust protocol settings for minimized trust bias and maximize application performance. This paper helps to minimize the trust under the presence of malicious nodes.

References

  • Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho, "Trust management in mobile ad hoc networks for bias minimization and application performance maximization", Elsevier 2014.
  • Rajshree Ambatkar, Purnima Selokar, "A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme", IJSR Volume 3 Issue 12, December 2014.
  • F. Bao, I. R. Chen, M. Chang, J. H. Cho, "Trust-based intrusion detection in wireless sensor networks", in: IEEE Int'l Conf. on Communication, Kyoto, Japan, June 2011, pp. 1-6
  • M. Blaze, J. Feigenbaum , J. Lacy, "Decentralized trust management", in: IEEE Symposium on Security and Privacy, May 1996, pp. 164-173.
  • B. J. Chang, S. L. Kuo, "Markov chain trust model for trust value analysis and key management in distributed multicast MANETs", IEEE Trans. Veh. Technol. 58 (4) (2009) 1846-186
  • Y. Ren, A. Boukerche, "Modeling and managing the trust for wireless and mobile ad-hoc networks", in: IEEE International Conference on Communications, Beijing, China, May 2008, pp. 2129-2133.
  • J. H. Cho, A. Swami, I. R. Chen, "A survey on trust management for mobile ad hoc networks", IEEE Commun. Surv. Tutorials 13 (4) (2011) 562-583.
  • Jin-Hee Cho,"Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks" U. S. Army Research Laboratory.
  • C. Ashok Baburaj, Dr. K. Alagarsamy, "Repetitive Trust Management and Adversary Detection For Delay Tolerant Networks", JATIT 2014.
  • E. M. Daly, M. Haahr,"Social network analysis for information flow in disconnected delay-tolerant MANETs", IEEE Trans. Mob. Comput. 8 (2009)606-621.
  • Younghun Chae, Lisa Cingiser DiPippo,Member, IEEE Computer Society," Trust Management for Defending On-Of Attacks",April 2015.
  • Xiaoyong Li, Feng Zhou, and Junping Du,LDTS:" A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks",June 2013.